How to install and configure wireless bluetooth in Linux

Source: Internet
Author: User

Bluetooth Support
One of the best Linux releases is SuSE Linux. The following describes how to configure Bluetooth in SuSE Linux 9.3 and later versions. SuSE
Linux Professional 9.3 has made significant improvements in mobility. It provides complete bluetooth wireless support:

* Automatic Identification of Bluetooth enabled Device ;
* Simplify Bluetooth configuration (via YaST );
* Data Synchronization with Bluetooth mobile phones and Palm Pilot is simplified;

With SuSE Linux Professional 9.3, you can easily connect to a wireless LAN (WLAN) and
It is easy to move with other network connections. In addition, its enhanced pause to disk function can run on almost all laptops. SuSE Linux Professional
9.3 multiple Bluetooth management tools are also included in the desktop environment.

1. Use yast2 to configure Bluetooth

SUSE contains a powerful and classic YaST control center. You can use simple wizard programs to perform complicated configuration processes, such as setting up HTTP Service ,
Set the NIC, adjust the bluetooth device, governance software, and configure the monitor and video card. Use yast2
The Bluetooth module configures Bluetooth support on the system. Once the Bluetooth adapter is detected in the system by hot swapping (for example, during boot or when the adapter is inserted), the Bluetooth is automatically started using the settings configured in this module. Start
Yast2: Select "hardware"-"Bluetooth" for the next time.

Use yast2 to configure Bluetooth

The first step of configuration is to determine whether to enable the Bluetooth service in your system. If the Bluetooth service is enabled, you can configure two items. Configure the device name first. This is displayed by other devices when your computer is found.
Name. Two Placeholders are available, where-% H represents the Host Name of the system (this is useful, for example, if the host name is dynamically allocated by DHCP), and % d
Insert the interface number (only when multiple Bluetooth adapters are installed on the computer ).

For example, if you enter laptop % H in this field and DHCP assigns the name unit123 to the computer Remote The device identifies your computer as laptop unit123. Click Advanced daemon configuration to go to the select and configure available services (referred to as configuration files in Bluetooth) dialog box.

All available services are displayed in the list. You can enable or disable these services by clicking activate or deactivate. Click Edit to open a dialog box in which you can specify other parameters for the selected service (Daemon. For example.

Configure the Bluetooth daemon

Bluetooth daemon description:

Hcid-Host Controller Interface daemon manages all Bluetooth devices on the computer.
Sdpd-you need to use the Service Discovery Protocol daemon in a remote device to find the Bluetooth service available on your computer. Other daemon are connected to this daemon.
OPD-for example, you need the obex push daemon to transfer files from a device to your computer. If you are using KDE or gnome, do not activate the OPD daemon. This daemon is only required for other desktops and may cause problems with KDE and gnome.
RFCOMM-this is a serial cable simulation protocol required for certain devices and services. It is not a "real" daemon, but a process for configuring existing Bluetooth devices.
Pand-the personal network daemon is used to create a network that uses Bluetooth. It creates a wireless Ethernet network.
Dund-the dial-up network daemon promises to access the LAN through PPP. If you have a Bluetooth modem, you need it.
Hid-human-computer interaction device briefing is used for devices such as keyboards and mice.
Hid2hci-this is not actually a "real" daemon, but a Help Utility used to switch the hid adapter to the HCI mode, and vice versa.

Ii. Bluetooth Security Configuration

Return to the main dialog box, click Security Options to enter the security dialog box and specify encryption, authentication, and scan settings. The parameter security manager is related to the behavior of the local system when a remote device attempts to connect. The difference is that
PIN code processing. This process either promises that no device uses a pin for connection or determines how to select the Correct PIN when a pin is needed.

You can enter a pin in the corresponding input field (stored in the configuration file ). If the device tries to connect, it uses this pin first. If the connection fails, it is switched to not used
Pin. For maximum security, it is best to always require the user to provide a pin. This option allows you to use different pins for different (remote) devices. For example.

Bluetooth Security Configuration

Note: despite the pin, data transmission between two devices is not completely secure. By default, Bluetooth The connection authentication and encryption are in the unactivated state. For some Bluetooth devices, activation authentication and encryption may cause communication problems.

Then, exit the security dialog box and return to the main dialog box. After you click Finish to close the main dialog box, you can use the Bluetooth system. To use Bluetooth to set the network, activate
Pand, and then click Edit to set the daemon mode. For a valid Bluetooth network connection, a pand
It must run in the listening mode, and the corresponding peer must run in the search mode. By default, the default mode is listener. Adjust the local pand behavior. In addition
Configure the bnepx interface in the NIC module (X indicates the device number in the system ).

3. Use the Konqueror browser for governance Bluetooth Device

In Konqueror, enter URL Bluetooth:/to list local and remote Bluetooth devices. Double-click a device to obtain Service . If you move the cursor over a specified service, the browser's status bar displays the configuration file used for this service.

If you click a service, a dialog box is displayed, asking you whether to save or use the service (you must start the application to perform this operation) or cancel the operation. If you do not want this dialog box to be displayed again, but want to always perform the selected operation, select a specific check box. For example.

Use the Konqueror browser to manage Bluetooth devices

4. Send the file Bluetooth Device

Next, you can send a file to the bluetooth device. First, right-click the file to be sent and choose "send with keys ". For example.

Send a file to a bluetooth device

Select a bluetooth device, and then you can send it. Is the file transfer interface.

File Transfer Interface

In addition, after the system configuration is complete, there is a brave Bluetooth toolbar in the bottom right corner of the desktop for easy use, as shown in.

Kdebluetooth Tool

With the continuous development and improvement of the open-source community project kdebluetooth, apatite uses the project as a prototype to provide Bluetooth communication support for the system, and fixes the stability of the project.
. Kdebluetooth is a Bluetooth application framework built on the bluez protocol stack. It uses the KDE/Qt library to provide a series of graphical Bluetooth application tools.

5. configuration under the command line Bluetooth

Although Trend It has switched from the command line method to the graphical interface mode. A large number of mouse operations are adopted, but shell is still very strong in Linux. One thing that is good for command line is that it allows you to prepare hundreds of tool software. On the command line interface, you can use a pipeline to combine the tool software to execute a task that cannot be completed by a single tool software.

"One process is to execute a command in Linux. Inter-process communication is one of the verifications of Unix/Linux. A channel (written as a vertical line "|", in the command line or on the keyboard is
A vertical line) provides the simplest way of communication. Simply put, a channel accepts the output of a tool software and then inputs the output to other tool software.

Using the Unix/Linux vocabulary, this channel accepts the standard output of a process and uses the standard output as the standard input of another process. Most of the content displayed in a process will
Send to standard output. If you do not redirect the output, it will be displayed on the screen. With one channel, you can redirect this output so that it becomes the identifier of another tool software.
Accurate input ."

The configuration files of each part of the bluez system are located in the/etc/Bluetooth directory. The only exception is the file used to start the component.
/Etc/sysconfig/Bluetooth. The file is modified by the YaST module. Only the User Root
You can modify the configuration file described below. Currently, there is no graphic user interface for changing all settings.

Generally, the default settings can meet the requirements. PIN numbers can be used to prevent unnecessary connections. When a mobile phone establishes the first contact (or when a device connection is established on the phone ),
Pin. To enable communication between the two devices, the two devices must be identified with the same pin. On the computer, the pin is located in the file
/Etc/Bluetooth/pin. In the configuration file/etc/Bluetooth/hcid. conf
, Such as device name and security mode.

Generally, the default settings can meet the requirements. This file contains comments about various setting options. Two parts of the file are specified as options and
Device. The former contains the general information that hcid is used to start. The latter includes settings for each local Bluetooth device. One of the most important settings in the options section is
Security auto ;.

If set to auto, hcid tries to use a local pin for the incoming connection. If it fails, it switches to none
And establish a connection. To improve security, the default setting should be set to user to ensure that the user is required to enter a pin each time a connection is established. In Device
Some settings show the device name used by the computer on another device. This section defines the device category, such as desktop, laptop, or
Server. Authentication and encryption are also enabled or disabled here.

6. Command Line tools

Bluetooth The operability depends on the interaction of various services. At least two backend daemon are required: hcid (Host Controller Interface Daemon) and sdpd (Service Discovery Protocol Daemon). The former acts as the interface for Bluetooth backup and controls the Bluetooth Device The device can find the services provided by the host through the latter. If hcid and sdpd are not automatically activated when the system is started, you can use the command rcbluetooth start to activate these two daemon. You must run this command as the root user.

The following describes the most important shell tool that can be used to use Bluetooth. Although you can now use a variety of graphical components to control Bluetooth, these programs are worth your attention. Some commands can only be executed as root users.


Hcitool can be used to determine whether local and Remote Set
Backup. Command hcitool Dev to list local devices. The output generates a line for each detected local device. You can use the command hcitool INQ
Search for remote devices. For each detected remote device, 3 is returned.
Device address, clock offset, and device type. The device address is very important because other commands use it to identify the target device. Clock offset is mainly used for technical purposes. The device class is specified in hexadecimal format.
Type and Service Type.

The command hcitoolname device-address can be used to determine the device name of a remote device. For remote computers, the device and device names correspond
/Etc/Bluetooth/hcid. conf
. Use the local device address to generate error output. Hcitool command line-based Bluetooth scanning program, which is embedded with the bluez protocol that has been compiled into the kernel.
Called hcitool, it can find all the discoverable
Mode. Hcitool's website home address is
/Hcitool1.html; now, we use another bluetooth device within the computer's valid range to ensure that the device is visible to the Bluetooth scan. Then, run hcitool from the command line.
Scan. This process will last for 15 ~ After scanning is completed in 20 s, the following information will be displayed:

My output:

Hcitool Scan
00: E0: 03: 36: 90: 2D Nokia 6230


The command/usr/sbin/hciconfig provides detailed information about the local device. If hciconfig is executed without any parameters, the output displays the device name.
(Hcix) and other device information, physical device address (12 digits, in the form of 00: 12: 34: 56: 78) and information about the transmitted data volume. Hciconfig
Hci0 name indicates the name that is returned when your computer receives a request from a remote device. In addition to querying local device settings, hciconfig
You can also modify these settings. For example, hciconfig hci0 name Test Sets the name to test. The typical output is as follows:

Hci0: Type: USB
BD address: 00: A0: 96: 20: 2b: A0 acl mtu: 128:8 sco mtu: 64: 8
Up running pscan iscan
RX Bytes: 159590 ACL: 1544 SCO: 0 events: 977 errors: 0
TX Bytes: 56114 ACL: 769 SCO: 0 commands: 210 errors: 0
Features: 0xff 0xff 0x05 0x00 0x00 0x00 0x00 0x00
Packet type: DM1 dm3 dm5 dh1 DH3 DH5 hv1 HV2 hv3
Link policy: rswitch hold sniff Park
Link mode: slave accept
Name: 'bluez (Enki )'
Class: 0x100100
Service Classes: object transfer
Device class: Computer, uncategorized
HCI Ver: 1.1 (0x1) HCI Rev: 0x72 LMP Ver: 1.1 (0x1) LMP subver: 0x72
Manufacturer: Cambridge silicon Radio (10)

Note: if this information is not displayed, check whether the hcid is running and whether there is an error message in the file/var/log/messages. The BD address of the adapter is the unique identifier of the Bluetooth identifier, which is similar to the MAC address of the Ethernet.


The sdptool command can be used to check which services are provided by a specific device. Command sdptoolbrowsedevice_address
Returns all services of a device. Use the sdptool searchservice_code command
Search for specific services. This command scans all accessible devices to search for requested services. If one of the devices provides services, the program will output the complete service name and brief description returned by the device. Input without Parameters
Sdptool allows you to view a list of all possible service codes. The typical output is as follows:

Sdptool browse 00: E0: 03: 36: 90: 2D
Service name: obex object push
Service rechandle: 0x1000e
Service class ID list:
"Obex object push" (0x1105)
Protocol descriptor list:
"L2CAP" (0x0100)
"RFCOMM" (0x0003)
Channel: 9
"Obex" (0x0008)
Language base ATTR list:
Code_iso639: 0x656e
Encoding: 0x6a
Base_offset: 0x100
Profile descriptor list:
"Obex object push" (0x1105)
Version: 0x0100


Now, devices supporting wireless bluetooth are everywhere, and the use of related software is very simple. However, many consumers do not know how to use it. This article introduces the basics of Bluetooth
Knowledge and how to install some Bluetooth devices in Linux. As the number of built-in Bluetooth devices increases, it would be a pity to exchange information with the computer without Bluetooth, but the current built-in Bluetooth is not
More, just buy a Bluetooth adapter on the market. The 1.2 version is basically 40-80 yuan

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.